Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 2 | /* |
| 3 | * fs/proc_namespace.c - handling of /proc/<pid>/{mounts,mountinfo,mountstats} |
| 4 | * |
| 5 | * In fact, that's a piece of procfs; it's *almost* isolated from |
| 6 | * the rest of fs/proc, but has rather close relationships with |
| 7 | * fs/namespace.c, thus here instead of fs/proc |
| 8 | * |
| 9 | */ |
| 10 | #include <linux/mnt_namespace.h> |
| 11 | #include <linux/nsproxy.h> |
| 12 | #include <linux/security.h> |
| 13 | #include <linux/fs_struct.h> |
Ingo Molnar | f719ff9b | 2017-02-06 10:57:33 +0100 | [diff] [blame] | 14 | #include <linux/sched/task.h> |
| 15 | |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 16 | #include "proc/internal.h" /* only for get_proc_task() in ->open() */ |
| 17 | |
| 18 | #include "pnode.h" |
| 19 | #include "internal.h" |
| 20 | |
Al Viro | 076ccb7 | 2017-07-03 01:02:18 -0400 | [diff] [blame] | 21 | static __poll_t mounts_poll(struct file *file, poll_table *wait) |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 22 | { |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 23 | struct seq_file *m = file->private_data; |
| 24 | struct proc_mounts *p = m->private; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 25 | struct mnt_namespace *ns = p->ns; |
Linus Torvalds | a9a0884 | 2018-02-11 14:34:03 -0800 | [diff] [blame] | 26 | __poll_t res = EPOLLIN | EPOLLRDNORM; |
Al Viro | aab407f | 2013-09-29 10:59:59 -0400 | [diff] [blame] | 27 | int event; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 28 | |
| 29 | poll_wait(file, &p->ns->poll, wait); |
| 30 | |
Mark Rutland | 6aa7de0 | 2017-10-23 14:07:29 -0700 | [diff] [blame] | 31 | event = READ_ONCE(ns->event); |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 32 | if (m->poll_event != event) { |
| 33 | m->poll_event = event; |
Linus Torvalds | a9a0884 | 2018-02-11 14:34:03 -0800 | [diff] [blame] | 34 | res |= EPOLLERR | EPOLLPRI; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 35 | } |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 36 | |
| 37 | return res; |
| 38 | } |
| 39 | |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 40 | struct proc_fs_opts { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 41 | int flag; |
| 42 | const char *str; |
| 43 | }; |
| 44 | |
| 45 | static int show_sb_opts(struct seq_file *m, struct super_block *sb) |
| 46 | { |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 47 | static const struct proc_fs_opts fs_opts[] = { |
Linus Torvalds | 1751e8a | 2017-11-27 13:05:09 -0800 | [diff] [blame] | 48 | { SB_SYNCHRONOUS, ",sync" }, |
| 49 | { SB_DIRSYNC, ",dirsync" }, |
| 50 | { SB_MANDLOCK, ",mand" }, |
| 51 | { SB_LAZYTIME, ",lazytime" }, |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 52 | { 0, NULL } |
| 53 | }; |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 54 | const struct proc_fs_opts *fs_infop; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 55 | |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 56 | for (fs_infop = fs_opts; fs_infop->flag; fs_infop++) { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 57 | if (sb->s_flags & fs_infop->flag) |
| 58 | seq_puts(m, fs_infop->str); |
| 59 | } |
| 60 | |
| 61 | return security_sb_show_options(m, sb); |
| 62 | } |
| 63 | |
| 64 | static void show_mnt_opts(struct seq_file *m, struct vfsmount *mnt) |
| 65 | { |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 66 | static const struct proc_fs_opts mnt_opts[] = { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 67 | { MNT_NOSUID, ",nosuid" }, |
| 68 | { MNT_NODEV, ",nodev" }, |
| 69 | { MNT_NOEXEC, ",noexec" }, |
| 70 | { MNT_NOATIME, ",noatime" }, |
| 71 | { MNT_NODIRATIME, ",nodiratime" }, |
| 72 | { MNT_RELATIME, ",relatime" }, |
Mattias Nissler | dab741e0 | 2020-08-27 11:09:46 -0600 | [diff] [blame] | 73 | { MNT_NOSYMFOLLOW, ",nosymfollow" }, |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 74 | { 0, NULL } |
| 75 | }; |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 76 | const struct proc_fs_opts *fs_infop; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 77 | |
Alexey Gladkov | 1e88c42 | 2020-04-19 16:10:51 +0200 | [diff] [blame] | 78 | for (fs_infop = mnt_opts; fs_infop->flag; fs_infop++) { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 79 | if (mnt->mnt_flags & fs_infop->flag) |
| 80 | seq_puts(m, fs_infop->str); |
| 81 | } |
Christian Brauner | 9caccd4 | 2021-01-21 14:19:54 +0100 | [diff] [blame] | 82 | |
Christian Brauner | bb49e9e | 2021-12-03 12:16:58 +0100 | [diff] [blame] | 83 | if (is_idmapped_mnt(mnt)) |
Christian Brauner | 9caccd4 | 2021-01-21 14:19:54 +0100 | [diff] [blame] | 84 | seq_puts(m, ",idmapped"); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 85 | } |
| 86 | |
| 87 | static inline void mangle(struct seq_file *m, const char *s) |
| 88 | { |
| 89 | seq_escape(m, s, " \t\n\\"); |
| 90 | } |
| 91 | |
| 92 | static void show_type(struct seq_file *m, struct super_block *sb) |
| 93 | { |
| 94 | mangle(m, sb->s_type->name); |
David Howells | c7eb686 | 2019-03-25 16:38:31 +0000 | [diff] [blame] | 95 | if (sb->s_subtype) { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 96 | seq_putc(m, '.'); |
| 97 | mangle(m, sb->s_subtype); |
| 98 | } |
| 99 | } |
| 100 | |
| 101 | static int show_vfsmnt(struct seq_file *m, struct vfsmount *mnt) |
| 102 | { |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 103 | struct proc_mounts *p = m->private; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 104 | struct mount *r = real_mount(mnt); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 105 | struct path mnt_path = { .dentry = mnt->mnt_root, .mnt = mnt }; |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 106 | struct super_block *sb = mnt_path.dentry->d_sb; |
Dmitry V. Levin | 5d9f3c7 | 2015-11-19 00:57:52 +0300 | [diff] [blame] | 107 | int err; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 108 | |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 109 | if (sb->s_op->show_devname) { |
| 110 | err = sb->s_op->show_devname(m, mnt_path.dentry); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 111 | if (err) |
| 112 | goto out; |
| 113 | } else { |
| 114 | mangle(m, r->mnt_devname ? r->mnt_devname : "none"); |
| 115 | } |
| 116 | seq_putc(m, ' '); |
Dmitry V. Levin | 9d4d657 | 2014-12-16 06:59:37 +0300 | [diff] [blame] | 117 | /* mountpoints outside of chroot jail will give SEQ_SKIP on this */ |
| 118 | err = seq_path_root(m, &mnt_path, &p->root, " \t\n\\"); |
| 119 | if (err) |
| 120 | goto out; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 121 | seq_putc(m, ' '); |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 122 | show_type(m, sb); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 123 | seq_puts(m, __mnt_is_readonly(mnt) ? " ro" : " rw"); |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 124 | err = show_sb_opts(m, sb); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 125 | if (err) |
| 126 | goto out; |
| 127 | show_mnt_opts(m, mnt); |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 128 | if (sb->s_op->show_options) |
Al Viro | 34c80b1 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 129 | err = sb->s_op->show_options(m, mnt_path.dentry); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 130 | seq_puts(m, " 0 0\n"); |
| 131 | out: |
| 132 | return err; |
| 133 | } |
| 134 | |
| 135 | static int show_mountinfo(struct seq_file *m, struct vfsmount *mnt) |
| 136 | { |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 137 | struct proc_mounts *p = m->private; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 138 | struct mount *r = real_mount(mnt); |
| 139 | struct super_block *sb = mnt->mnt_sb; |
| 140 | struct path mnt_path = { .dentry = mnt->mnt_root, .mnt = mnt }; |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 141 | int err; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 142 | |
| 143 | seq_printf(m, "%i %i %u:%u ", r->mnt_id, r->mnt_parent->mnt_id, |
| 144 | MAJOR(sb->s_dev), MINOR(sb->s_dev)); |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 145 | if (sb->s_op->show_path) { |
Al Viro | a6322de | 2011-12-08 21:37:57 -0500 | [diff] [blame] | 146 | err = sb->s_op->show_path(m, mnt->mnt_root); |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 147 | if (err) |
| 148 | goto out; |
| 149 | } else { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 150 | seq_dentry(m, mnt->mnt_root, " \t\n\\"); |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 151 | } |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 152 | seq_putc(m, ' '); |
| 153 | |
| 154 | /* mountpoints outside of chroot jail will give SEQ_SKIP on this */ |
Dmitry V. Levin | 9ad4dc4 | 2012-10-17 20:29:36 +0400 | [diff] [blame] | 155 | err = seq_path_root(m, &mnt_path, &p->root, " \t\n\\"); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 156 | if (err) |
| 157 | goto out; |
| 158 | |
| 159 | seq_puts(m, mnt->mnt_flags & MNT_READONLY ? " ro" : " rw"); |
| 160 | show_mnt_opts(m, mnt); |
| 161 | |
| 162 | /* Tagged fields ("foo:X" or "bar") */ |
| 163 | if (IS_MNT_SHARED(r)) |
| 164 | seq_printf(m, " shared:%i", r->mnt_group_id); |
| 165 | if (IS_MNT_SLAVE(r)) { |
| 166 | int master = r->mnt_master->mnt_group_id; |
| 167 | int dom = get_dominating_id(r, &p->root); |
| 168 | seq_printf(m, " master:%i", master); |
| 169 | if (dom && dom != master) |
| 170 | seq_printf(m, " propagate_from:%i", dom); |
| 171 | } |
| 172 | if (IS_MNT_UNBINDABLE(r)) |
| 173 | seq_puts(m, " unbindable"); |
| 174 | |
| 175 | /* Filesystem specific data */ |
| 176 | seq_puts(m, " - "); |
| 177 | show_type(m, sb); |
| 178 | seq_putc(m, ' '); |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 179 | if (sb->s_op->show_devname) { |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 180 | err = sb->s_op->show_devname(m, mnt->mnt_root); |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 181 | if (err) |
| 182 | goto out; |
| 183 | } else { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 184 | mangle(m, r->mnt_devname ? r->mnt_devname : "none"); |
Dmitry V. Levin | 6ce4bca | 2015-11-19 00:58:20 +0300 | [diff] [blame] | 185 | } |
David Howells | bc98a42 | 2017-07-17 08:45:34 +0100 | [diff] [blame] | 186 | seq_puts(m, sb_rdonly(sb) ? " ro" : " rw"); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 187 | err = show_sb_opts(m, sb); |
| 188 | if (err) |
| 189 | goto out; |
| 190 | if (sb->s_op->show_options) |
Al Viro | 34c80b1 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 191 | err = sb->s_op->show_options(m, mnt->mnt_root); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 192 | seq_putc(m, '\n'); |
| 193 | out: |
| 194 | return err; |
| 195 | } |
| 196 | |
| 197 | static int show_vfsstat(struct seq_file *m, struct vfsmount *mnt) |
| 198 | { |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 199 | struct proc_mounts *p = m->private; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 200 | struct mount *r = real_mount(mnt); |
| 201 | struct path mnt_path = { .dentry = mnt->mnt_root, .mnt = mnt }; |
Al Viro | 6413237 | 2011-12-08 20:51:13 -0500 | [diff] [blame] | 202 | struct super_block *sb = mnt_path.dentry->d_sb; |
Dmitry V. Levin | b896fb3 | 2015-11-19 00:58:32 +0300 | [diff] [blame] | 203 | int err; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 204 | |
| 205 | /* device */ |
Al Viro | 6413237 | 2011-12-08 20:51:13 -0500 | [diff] [blame] | 206 | if (sb->s_op->show_devname) { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 207 | seq_puts(m, "device "); |
Al Viro | d861c63 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 208 | err = sb->s_op->show_devname(m, mnt_path.dentry); |
Dmitry V. Levin | 5f8d498 | 2015-03-19 11:10:54 +0000 | [diff] [blame] | 209 | if (err) |
| 210 | goto out; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 211 | } else { |
| 212 | if (r->mnt_devname) { |
| 213 | seq_puts(m, "device "); |
| 214 | mangle(m, r->mnt_devname); |
| 215 | } else |
| 216 | seq_puts(m, "no device"); |
| 217 | } |
| 218 | |
| 219 | /* mount point */ |
| 220 | seq_puts(m, " mounted on "); |
Dmitry V. Levin | 9d4d657 | 2014-12-16 06:59:37 +0300 | [diff] [blame] | 221 | /* mountpoints outside of chroot jail will give SEQ_SKIP on this */ |
| 222 | err = seq_path_root(m, &mnt_path, &p->root, " \t\n\\"); |
| 223 | if (err) |
| 224 | goto out; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 225 | seq_putc(m, ' '); |
| 226 | |
| 227 | /* file system type */ |
| 228 | seq_puts(m, "with fstype "); |
Al Viro | 6413237 | 2011-12-08 20:51:13 -0500 | [diff] [blame] | 229 | show_type(m, sb); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 230 | |
| 231 | /* optional statistics */ |
Al Viro | 6413237 | 2011-12-08 20:51:13 -0500 | [diff] [blame] | 232 | if (sb->s_op->show_stats) { |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 233 | seq_putc(m, ' '); |
Dmitry V. Levin | b896fb3 | 2015-11-19 00:58:32 +0300 | [diff] [blame] | 234 | err = sb->s_op->show_stats(m, mnt_path.dentry); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 235 | } |
| 236 | |
| 237 | seq_putc(m, '\n'); |
Dmitry V. Levin | 9d4d657 | 2014-12-16 06:59:37 +0300 | [diff] [blame] | 238 | out: |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 239 | return err; |
| 240 | } |
| 241 | |
| 242 | static int mounts_open_common(struct inode *inode, struct file *file, |
| 243 | int (*show)(struct seq_file *, struct vfsmount *)) |
| 244 | { |
| 245 | struct task_struct *task = get_proc_task(inode); |
| 246 | struct nsproxy *nsp; |
| 247 | struct mnt_namespace *ns = NULL; |
| 248 | struct path root; |
| 249 | struct proc_mounts *p; |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 250 | struct seq_file *m; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 251 | int ret = -EINVAL; |
| 252 | |
| 253 | if (!task) |
| 254 | goto err; |
| 255 | |
Eric W. Biederman | 728dba3 | 2014-02-03 19:13:49 -0800 | [diff] [blame] | 256 | task_lock(task); |
| 257 | nsp = task->nsproxy; |
Axel Lin | 3d93116 | 2014-01-23 15:55:44 -0800 | [diff] [blame] | 258 | if (!nsp || !nsp->mnt_ns) { |
Eric W. Biederman | 728dba3 | 2014-02-03 19:13:49 -0800 | [diff] [blame] | 259 | task_unlock(task); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 260 | put_task_struct(task); |
| 261 | goto err; |
| 262 | } |
| 263 | ns = nsp->mnt_ns; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 264 | get_mnt_ns(ns); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 265 | if (!task->fs) { |
| 266 | task_unlock(task); |
| 267 | put_task_struct(task); |
| 268 | ret = -ENOENT; |
| 269 | goto err_put_ns; |
| 270 | } |
| 271 | get_fs_root(task->fs, &root); |
| 272 | task_unlock(task); |
| 273 | put_task_struct(task); |
| 274 | |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 275 | ret = seq_open_private(file, &mounts_op, sizeof(struct proc_mounts)); |
| 276 | if (ret) |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 277 | goto err_put_path; |
| 278 | |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 279 | m = file->private_data; |
| 280 | m->poll_event = ns->event; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 281 | |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 282 | p = m->private; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 283 | p->ns = ns; |
| 284 | p->root = root; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 285 | p->show = show; |
Miklos Szeredi | 9f6c61f | 2020-05-14 16:44:24 +0200 | [diff] [blame] | 286 | INIT_LIST_HEAD(&p->cursor.mnt_list); |
| 287 | p->cursor.mnt.mnt_flags = MNT_CURSOR; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 288 | |
| 289 | return 0; |
| 290 | |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 291 | err_put_path: |
| 292 | path_put(&root); |
| 293 | err_put_ns: |
| 294 | put_mnt_ns(ns); |
| 295 | err: |
| 296 | return ret; |
| 297 | } |
| 298 | |
| 299 | static int mounts_release(struct inode *inode, struct file *file) |
| 300 | { |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 301 | struct seq_file *m = file->private_data; |
| 302 | struct proc_mounts *p = m->private; |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 303 | path_put(&p->root); |
Miklos Szeredi | 9f6c61f | 2020-05-14 16:44:24 +0200 | [diff] [blame] | 304 | mnt_cursor_del(p->ns, &p->cursor); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 305 | put_mnt_ns(p->ns); |
Yann Droneaud | ede1bf0 | 2015-06-30 14:57:30 -0700 | [diff] [blame] | 306 | return seq_release_private(inode, file); |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 307 | } |
| 308 | |
| 309 | static int mounts_open(struct inode *inode, struct file *file) |
| 310 | { |
| 311 | return mounts_open_common(inode, file, show_vfsmnt); |
| 312 | } |
| 313 | |
| 314 | static int mountinfo_open(struct inode *inode, struct file *file) |
| 315 | { |
| 316 | return mounts_open_common(inode, file, show_mountinfo); |
| 317 | } |
| 318 | |
| 319 | static int mountstats_open(struct inode *inode, struct file *file) |
| 320 | { |
| 321 | return mounts_open_common(inode, file, show_vfsstat); |
| 322 | } |
| 323 | |
| 324 | const struct file_operations proc_mounts_operations = { |
| 325 | .open = mounts_open, |
Linus Torvalds | 14e3e98 | 2020-12-27 10:56:33 -0800 | [diff] [blame] | 326 | .read_iter = seq_read_iter, |
| 327 | .splice_read = generic_file_splice_read, |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 328 | .llseek = seq_lseek, |
| 329 | .release = mounts_release, |
| 330 | .poll = mounts_poll, |
| 331 | }; |
| 332 | |
| 333 | const struct file_operations proc_mountinfo_operations = { |
| 334 | .open = mountinfo_open, |
Linus Torvalds | 14e3e98 | 2020-12-27 10:56:33 -0800 | [diff] [blame] | 335 | .read_iter = seq_read_iter, |
| 336 | .splice_read = generic_file_splice_read, |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 337 | .llseek = seq_lseek, |
| 338 | .release = mounts_release, |
| 339 | .poll = mounts_poll, |
| 340 | }; |
| 341 | |
| 342 | const struct file_operations proc_mountstats_operations = { |
| 343 | .open = mountstats_open, |
Linus Torvalds | 14e3e98 | 2020-12-27 10:56:33 -0800 | [diff] [blame] | 344 | .read_iter = seq_read_iter, |
| 345 | .splice_read = generic_file_splice_read, |
Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 346 | .llseek = seq_lseek, |
| 347 | .release = mounts_release, |
| 348 | }; |